Spanning the Gap: Products for Public Access Wi-Fi Networks

Size: px
Start display at page:

Download "Spanning the Gap: Products for Public Access Wi-Fi Networks"

Transcription

1 Public Access Wi-Fi Bulletin May 2003 Spanning the Gap: Products for Public Access Wi-Fi Networks Q: Are Home and Enterprise networking hardware products appropriate to Public Access Wi-Fi networks? Until just the last few years Wireless Fidelity (Wi-Fi) only appealed to the technologically savvy at home, or was one hundred percent implemented and supported by a full time IT staff at work. One promise technology has made for the wireless computing world is ubiquitous Wi-Fi in both private and public spaces, whether for work or leisure. At long last we are starting to see wireless computing really available at your local coffee shack (maybe it s Starbucks ), in your hotel, or in your apartment building. We will see much more! The Wireless at Home and Enterprise Wireless markets defined the networking products available today. So the question that service providers, who are going to build the Wi-Fi network in your coffee shack and at your hotel, must answer is the one above: Are Home and Enterprise networking hardware products appropriate to Public Access Wi-Fi networks? A: No. We need a new class of Wi-Fi access hardware. The existing wireless solutions that were tailored to fit the Home and Enterprise markets leave unacceptable gaps when tasked with subscriber access in public spaces. These devices are too complex in some areas, too simple in others, and just not quite right in yet others. Home and Enterprise Wi-Fi products just do not fit the public, in a literal sense. The Public Access Opportunity Subscribers do not have to be sold on the benefits of wireless at this point. The more the better will be their motto. Wireless in the coffee shop, in the airport, at the hotel, at the trade show: they want it all. IDC (July 2002) estimates that by 2006, five million subscribers at forty-two thousand locations will regularly access the Internet over public Wi-Fi. Increased demand is driven by the growing number of off-site and mobile workers, currently estimated at seventy-eight million by Cahners In-Stat/MDR and expected to grow to one hundred and six million by The infrastructure rollout required to support these subscribers will be massive. A relatively new and exciting technology like public Wi-Fi, with pent-up and growing demand, can get by with less than optimal deployments using whatever hardware is available. However, as consumers get more savvy, service providers begin to butt heads, and investors want more, or any, return on their investments, the spoils of public access will go to the most efficient, best designed network systems. Will these new public access networks just be extensions of the well known Home and Enterprise networks? Or something new? Wireless network architects can make three design determinations, we would hope based on their analysis of user s needs.

2 Are Public Users Like Small Office/Home Office (SOHO) Users? This design presumes that the first concern of public access systems is cost. SOHO hardware is ultracheap and designed to be easy to deploy. Though generic and inflexible, these gateways have hit a fiftydollar price point, or even less in bulk. You get what you pay for, of course. Are Public Users Like Enterprise Users? This design presumes that the primary concerns of public access Wi-Fi users are security and performance. Enterprise hardware is the best of the best wireless technology has to offer. High performance, high gain (signal strength, range, and quality), high security. Cost is one big disadvantage, with enterprise gateways and access points in the four hundred to eight hundred dollar range. The biggest question for enterprise hardware is whether the features you are paying for in an enterprise box are valuable to public access users, and are there other features that enterprise users did not even want that are public access must haves. Do Public Users Have Unique Requirements? This design makes network architects nervous. Few people like dealing with new scenarios that defy convenient pigeon holing. The presumption here is that public access Wi-Fi users have different requirements than existing customers in the home and office. Rather than trying to match the existing hardware to these users, the system is designed from the ground up to address the exact public access requirements. The disadvantage here is that there may be few, or no, manufacturers with the just right gateway for public access. How to Deploy a Public Wi-Fi Network Before the network architect can decide what kind of hardware to deploy, an assessment of the system s requirements must be made. In addition to those features the end user/subscriber wants and will pay for, consideration must be made of the software applications used for billing and configuration by the Wireless Internet Service Provider (WISP), as well as the requirements of IT professionals who must manage the system. The hardware itself might be a wireless LAN access point connected to a hard wired WAN gateway, or a combination wireless WAN and LAN gateway. A Simple Public Wi-Fi Use Case: An example of how we think a user will approach and use the service will inform a discussion of requirements. Joe and Jane are business travelers with laptops configured with static IP addresses, configuration, and http proxies. Joe is a direct T-Mobile subscriber, while Jane uses Boingo through their partner network. When traveling they need and web browsing and they may even want to print locally. All this needs to work quickly and easily, without adding or changing any settings on their laptops. Public Wi-Fi hardware requirements: 1. Network connectivity so users can access the Internet, browse, , etc. As the no-brainer, the hardware must have basic network support along with all that entails. Any gateway, home, enterprise or other would be expected to have these technologies, among others: b or g, IP Routing (TCP/UDP, ARP, ICMP), NAT and NATP, DHCP, DNS, PPP 2. Configurability The plethora of possible venues where these devices may be found means that the gateway itself must be manageable and configurable in many different ways. A basic HTML management interface will satisfy a small venue, while more sophisticated networks require a telnet-based Command Line Interface (CLI) or the Simple Network Management Protocol (SNMP). In addition, a sophisticated provider may have an

3 XML-based Operations Support System (OSS) used to automatically configure and monitor the network, requiring the gateway to support a web services model based on the Simple Object Access Protocol (SOAP). 3. Security Privacy and protection against theft of service are the top concerns for users and providers respectively. Joe and Jane do not want anyone reading their private s. T-Mobile, Boingo, and the Coffee Shack do not want hackers using the network for free, especially if they are not even drinking any cappuccino. Security has to work for everybody involved. a x to address well-known WEP weaknesses Unfortunately, a minimally skilled hacker can get free software to crack a WEP system and get full access within days or hours, depending on the volume of activity. A large public network, like an airport, would be extremely vulnerable. Longer or shorter encryption keys do not help this weakness. The new 802.1x enhancement to WEP protects the encryption keys using RADIUS to change them frequently. Supporting 802.1x require RADIUS support as well. b. Secure Web browsing using HTTPS Hyper Text Transport Protocol: Secure (HTTPS) using Secure Socket Layer (SSL) or Transport Layer Security (TLS) is the Internet standard for browser privacy via encryption. One possible complication is that the hardware itself must have its own HTTPS system. Configuration by an operator using the device s HTML GUI and users logging onto the system using their private name and password must be protected as well. Some gateways may only pass-through HTTPS from user machines the Internet, and may not have their own encrypted HTTP Server. This leaves unacceptable security vulnerability in the gateway. c. VPN pass through Virtual Private Networks (VPNs) are a way to create a private connection between machines that provides greatly improved security. Most likely Joe and Jane will log onto a VPN provided by their company, and set up by their IT staff, if they want to access company machines from outside the corporate network. It is important that a gateway support this kind of VPN. An additional VPN feature is the ability to terminate, rather than pass through, a VPN connection, meaning that the VPN connection starts or stops at the gateway itself. This is a key feature of an enterprise access point, but in general public users will want to connect to their existing company VPN, not create a new one at the airport. d. Firewall A firewall is a standard piece to software that would be in any but the lowest end gateway. It is very important to protect the network from malicious packets, worms, denial of service, and the like. e. Blacklist to ban abusive subscribers The gateway must allow the operator to identify bad actors on the network and prevent them from logging on again. Just canceling their account is not sufficient, since malicious users may just log on again under another name. A blacklist can associate these users with the MAC Address of their network card, preventing them from just logging on again with a new account. 4. RADIUS Billing Support Authentication, Access and Accounting (AAA) for Wireless ISP subscribers is generally accomplished using the well-defined Remote Authentication Dial In User Service (RADIUS) standard. This standard was originally designed for user access to modem banks, but has proven up to the task for wireless access control today. The WISP uses RADIUS to insure users are legitimate, track their usage patterns, bill value-added services, and any number of other account management chores. In addition, 802.1x depends

4 on RADIUS to protect the encryption keys. This makes RADIUS support extremely important for wireless access hardware. a. Local RADIUS One limitation of RADIUS is that it generally requires a separate RADIUS Server that is dedicated to tracking subscribers. Mostly often this server resides at a central location, such as the WISP headquarters. The problem is twofold. First, small venues may not have a central authority, leaving them to try to deal with installing an esoteric RADIUS server. Second, a network dependent on RADIUS for 802.1x security becomes vulnerable, or totally unusable, if the connection to the RADIUS authority is lost. For these two reasons a local RADIUS server, either on the gateway itself or as a separate device, is necessary. b. Local Credit Card Authentication A typical business model for public Wi-Fi is for users to log onto the network and then provide a credit card for daily or hourly access. Since AAA services are not coming from a central RADIUS server in a local configuration, the gateway must provide credit card authentication as well. 5. Multiple WISP Support A wireless network is beholden to a single WISP unless the gateway is capable of supporting several groups of subscribers simultaneously. Jane and Joe need to log onto different service home pages with different RADIUS Servers and different terms of service to get access to their T-Mobile and Boingo connections. The network hardware should be capable of supporting different user groups based on their preferred provider and subsequently distinguish between them. One way to create different user groups is by using multiple SSIDs at the access point. 6. WISP Branding Given that multiple WISPs are accessible on a particular public network, those providers will insist on being able to present their interfaces in accordance with their corporate image, with customized login pages, web content, etc. The access hardware must keep track of these ISP-provided brandings based on user selection of ISP. In addition, each WISP has separate Walled Gardens (pre-approved web pages not requiring log on) that their subscribers, actual or prospective, can access. 7. Physical Deployment The sheer variety of possible public venues means the hardware must be available with and without secure enclosures (so you can not steal it off the wall in the airport lounge), and with different antenna options offering different signal strength and direction. Some venues may even need weatherproof outdoor enclosures. 8. Transparency Transparency is a catch all for the user experience of everything just working. Because Jane and Joe, or any typical user, cannot be required to reconfigure their laptop, the network must support their laptops as they are. This extends to not installing proprietary clients, printer drivers, or any other software. a. Printing Typically wireless printing is just an extension of regular printing over the LAN. However, the user needs the appropriate printer driver installed. Since there is no guarantee that a user in the hotel will have a particular driver, the network must support a more generic method of printing to a local printer in the hotel lobby, airport information kiosk, or attached directly to the gateway itself. This could be accomplished using a file upload to a web page on the gateway, or via an attachment.

5 b. IP Settings User laptops may have any combination of static and dynamic IP settings, HTTP proxies, or other network settings. Realistically, these can not be changed each the time the user wants to connect, so the network must be configured to support any possible setting silently and transparently. c. As with IP settings above, public users may have any combination of Simple Mail Transport Protocol (SMTP) settings. In particular, subscribers may be using a SMTP server to send their where SMTP does not accept from outside a private network. Without intervention the subscriber s SMTP server will not send these s. The network must insure that this is correctly delivered by using its own SMTP server. d. WISP As in 5 and 5a above, the user must be able to select their specific WISP, assuming it is supported by the network, with branding, login methodology, and all of the other features that the subscriber is accustomed to from their WISP. A typical public access Wi-Fi application looks like the diagram below. Please note that the gateway is often authenticating to more than one Network Operating Center, so that different service providers may be supported at the location. In addition, 802.1x/RADIUS server functionality may be in the gateway itself for local authentication. The bottom line is that the gateway needs to be flexible enough to support different usage and billing scenarios. With an understanding of the public access user, hardware, and software requirements we can consider how the APs and gateways available off-the-shelf for Home and Enterprise today measure up. Home (SOHO) Wi-Fi: Too Cold At fifty dollars, or less, the price is right for SOHO gateways and access points. But how do they measure up to our requirements for a successful public network? Looking at the requirements above, not very well. The only area where SOHO hardware measures up is basic connectivity and a firewall. Configurability is in most cases limited to a Web GUI only, security consists of the vulnerable WEP, and RADIUS is absent in any form. No RADIUS means no WISP support at all, and a SOHO gateway is not going to handle any kind of non-standard user settings of any kind.

6 Conclusion Even at such a low price point, a Home Gateway is just not feature rich enough to be usable in a public network that has any kind of billing or security requirements. The money saved in deployment would just be squandered as users and operators became frustrated with the configuration problems and lack of features. This kind of gateway might be appropriate for a totally free hotspot in a café where it was free and open to all. Enterprise Wi-Fi: Too Hot At four hundred to eight hundred dollars, or more, the Enterprise gateway is a fine piece of hardware. Basic connectivity is there of course, and probably includes a, with its greater access speed, as well. Configurability via Web and SNMP are definite, with CLI probably, and SOAP maybe. Security is excellent, and probably includes VPN termination, and possibly a proprietary WLAN client with improved security (Cisco LEAP for example). RADIUS support is there, but probably not local RADIUS except at the top end. Firewall and deployment options are definitely there. However, there are some important features missing as well that may make the Enterprise gateway seem a little tepid. Multi-WISP support and WISP branding are not needed nor included in an Enterprise gateway. The transparency requirements are just not Enterprise issues, because the IT department can control the user s laptop settings. So , printing, and IP configuration are just going to be unavoidable headaches for users. The user can resolve and IP configuration problems by reconfiguring their laptop, which will work for technology savvy subscribers, but printing just will not work. Conclusion It must be recognized that the public Wi-Fi networks and hotspots that we enjoy today are for the most part based on deployment of Enterprise gateways, so there must have something going for them. The question, then, is Enterprise hardware the right answer? Creating a public network using enterprise gateways and access points is a waste of excellent technology and money. The extra features like VPN termination and a are simply not appropriate. Even worse, only the highest-end devices are likely to have local RADIUS, multiple WISP support, and SOAP, making this a painfully hot solution indeed. Billing and branding are the keys to successful public access Wi-Fi deployment. These issues are completely irrelevant to the Enterprise. Public Access Wi-Fi: Just Right A public access Wi-Fi gateway specially designed to satisfy our public access requirements will, of course, be right on target. On target to the extent that we have understood our customers. The danger was that no one would step forward to address these requirements, leaving no option for service providers wishing to establish a serious and profitable business for public access Wi-Fi. Fortunately, a select group of new companies, including ValuePoint Networks, are already moving ahead in this market space. These companies are providing products that fall into a spectrum of prices that match the requirements for a Public Access Wi-Fi deployment. Conclusion Superior branding and billing services are to key to the success of anyone deploying a network for public access Wi-Fi. Security and new feature technologies will become commodities once the excitement fades. Subscriber loyalty will be based on ease of use, as it always is. Given the plethora of Wi-Fi hardware available for Home and Enterprise, when architecting your public access Wi-Fi network choose hardware purpose built to contribute to your ultimate success. Design your network for all of the parties involved. Choose products designed from the ground up for billing, branding, and transparency in a public Wi-Fi network.

Network Controller. Complete Control and Management of Public Access Networks

Network Controller. Complete Control and Management of Public Access Networks Network Controller NC-3500 Complete Control and Management of Public Access Networks ValuePoint Networks 3500 Network Controller provides high performance, authenticated, and seamless broadband connectivity

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA   White Paper Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction

More information

BW1330. High Performance Hotspot Access Point

BW1330. High Performance Hotspot Access Point BW1330 High Performance Hotspot Access Point 9 July 2008 Overview Hardware Introduction Product Specification Product Features Application Overview Overview The BW1330 Hotspot Access Point is a high-performance

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agnoura Road Suite 102 Agoura Hills, CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agnoura Road Suite 102 Agoura Hills, CA USA  White Paper Nomadix Service Engine Integration into Public Access Devices Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agnoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com 230-1024-001 Sheet

More information

BW1330. High Performance Hotspot Access Point. Browan Communications. 6 August 2007 Version 1.0

BW1330. High Performance Hotspot Access Point. Browan Communications. 6 August 2007 Version 1.0 BW1330 High Performance Hotspot Access Point Browan Communications 6 August 2007 Version 1.0 Overview Hardware Introduction Product Specification Product Features Application Customer Type Page 2 Overview

More information

TopGlobal MB8000 Hotspots Solution

TopGlobal MB8000 Hotspots Solution MB8000 s MB8000 is a mobile/portable wireless communication gateway. It combines the best of Wi-Fi technology and 2.5G/3G mobile communication technology. WISP can deploy their wireless hotspots with MB8000

More information

G-4200 SMB PAC with built-in AAA

G-4200 SMB PAC with built-in AAA G-4200 SMB PAC with built-in AAA 10 Mar. 2008 Browan, Inc. Version 1.1 Page 1 Production overview The G-4200 is a cost-effective platform designed for small to medium sized public access venues. AT-A-GLANCE:

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL. Index Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Children s Health System. Remote User Policy

Children s Health System. Remote User Policy Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards

More information

How to Stay Safe on Public Wi-Fi Networks

How to Stay Safe on Public Wi-Fi Networks How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi

More information

Seamless Yet Secure -Hotspot Roaming

Seamless Yet Secure -Hotspot Roaming Seamless Yet Secure -Hotspot Roaming CDG Wi-Fi Summit 2003 Steve Reyes Product Management and Development 4501 Intelco Loop SE Olympia, WA 98507 913-814-6262 Sreyes@verisign.com 1 Vision: Mobile and Portable

More information

D-Link AirPlus G DWL-G700AP

D-Link AirPlus G DWL-G700AP TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration

More information

DATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance

DATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance Motorola EDGE Service Assurance Software Suite The allows service providers to expand broadband service revenues while reducing operational and support costs through automated service provisioning and

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

WHG713. Secure WLAN Controller

WHG713. Secure WLAN Controller WHG713 Secure WLAN Controller Copyright Notice This document is protected by USA copyright laws and other laws. Besides, the document is the property of 4IPNET, INC. You may not copy, reproduce, distribute,

More information

Network Controller 3500 Quick Start Guide

Network Controller 3500 Quick Start Guide Network Controller 3500 Quick Start Guide Firmware Version 1.00.82 1. Configuring the Controller 1.1. Connect to the Controller: The default LAN IP Address of the Controller is: IP: 192.168.1.1 Set you

More information

White Paper Copyright 2002 Nomadix, Inc. All Rights Reserved. Tuesday, January 21, 2003

White Paper Copyright 2002 Nomadix, Inc. All Rights Reserved. Tuesday, January 21, 2003 Wireless ISP Roaming Copyright 2002 Nomadix, Inc. All Rights Reserved. Tuesday, January 21, 2003 31355 Agoura Road Westlake Village, CA 91361 www.nomadix.com 230-1029-001 Page 2 of 24 Contents Introduction...

More information

WHG711 V3.20. Secure WLAN Controller

WHG711 V3.20. Secure WLAN Controller WHG711 V3.20 Secure WLAN Controller Copyright Notice This document is protected by USA copyright laws and other laws and is the property of 4IPNET, INC. You may not copy, reproduce, distribute, publish,

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

EWS5207. Secure WLAN Controller

EWS5207. Secure WLAN Controller EWS5207 Secure WLAN Controller Copyright Notice This document is protected by USA copyright laws and other laws and is the property of Edgecore Networks Corporation. You may not copy, reproduce, distribute,

More information

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT Hüseyin ÇOTUK Information Technologies hcotuk@etu.edu.tr Ahmet ÖMERCİOĞLU Information Technologies omercioglu@etu.edu.tr Nurettin ERGİNÖZ Master Student

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users Learning Objectives Explain why authentication is a critical aspect of network security Explain

More information

The All-in-one Guest Access Solution of

The All-in-one Guest Access Solution of The All-in-one Guest Access Solution of Redefining Networking Integration Tomorrow, Delivered Today Application Guide Series Series Application Guide Providing access in hospitality venues is not the same

More information

D-Link AirPlus G DI-524

D-Link AirPlus G DI-524 D-Link AirPlus G DI-524 802.11g/ 2.4 GHz Wireless Router TM Manual Building Networks for People Contents Package Contents... 3 Introduction... 4 Wireless Basics... 8 Getting Started...11 Using the Configuration

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Tropos Technology Overview

Tropos Technology Overview Tropos Technology Overview May 2005 Enzo Zerbi Business Development Manager enzo.zerbi@programatica.it Agenda Introduction Tropos MetroMesh Architecture Tropos MetroMesh OS Predictive Wireless Routing

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Building a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007

Building a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007 Agenda: Securing Wireless Networks Building a Secure Wireless Network Joel M Snyder Senior Partner Opus One jms@opus1.com Using encryption and authentication Handling unauthenticated users Managing RF

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

High Power Wi-Fi with Integrated Directional Antenna

High Power Wi-Fi with Integrated Directional Antenna SuperAP 530g IA-12 Rugged AP/Bridge High Power Wi-Fi with Integrated Directional Antenna ValuePoint Networks SuperAP 530g IA-12 is designed for indoor/outdoor Wi- Fi deployments in hotels, apartment buildings,

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

AP-51XX v r Release Notes Part Number 72E

AP-51XX v r Release Notes Part Number 72E AP-51XX v2.3.0.0-019r Release Notes Part Number 72E-126383-01 Introduction New Features AP-51XX Hardware/ Software Compatibility Matrix AP-51XX Default Configurations Firmware Update Resetting the AP-51XX

More information

2018 Mobile Security Report

2018 Mobile Security Report 2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your

More information

WHG711 Wireless LAN Controller

WHG711 Wireless LAN Controller WHG711 Wireless LAN Controller Wireless INTRODUCTION The WHG711 is an enterprise-grade wireless LAN controller that provides establishments such as hotels, universities, or even complete municipalities

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Hotspots. May 15 th, 2008

Hotspots. May 15 th, 2008 Public Wireless Networks & Hotspots May 15 th, 2008 Overview Who are we? Solving the problem Network Design Approach Hotspot System Design Marketing / Deployment Who are we? Who we are. Wireless neutral-host

More information

Cyber Security Guidelines for Public Wi-Fi Networks

Cyber Security Guidelines for Public Wi-Fi Networks Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

LevelOne. Quick Installation Guide. WHG series Secure WLAN Controller. Introduction. Getting Started. Hardware Installation

LevelOne. Quick Installation Guide. WHG series Secure WLAN Controller. Introduction. Getting Started. Hardware Installation Introduction LevelOne WHG series Secure WLAN Controller LevelOne Secure WLAN Controller is the most advanced yet simple deployment and cost-effective wireless solution; it is an ideal security solution

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

User Manual DIR-850L. Wireless AC1200 Dual Band Gigabit Router.

User Manual DIR-850L. Wireless AC1200 Dual Band Gigabit Router. User Manual DIR-850L Wireless AC1200 Dual Band Gigabit Router USER MANUAL: DIR-850L Wireless AC1200 Dual Band Gigabit Router SYSTEM REQUIREMENTS Network Requirements Web-based Configuration Utility Requirements

More information

WNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.

WNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power. 300Mbps 802.11n Wireless Broadband Router Ultra High Speed 802.11n Wireless The WNRT-627 features latest IEEE 802.11n radio with 2T2R MIMO antenna technology to provide improved wireless speed and coverage

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

FLEXIBLE WI-FI AUTHENTICATION

FLEXIBLE WI-FI AUTHENTICATION FLEXIBLE WI-FI AUTHENTICATION FEATURE GUIDE SUMMARY OF FEATURES BROWSER-BASED AUTHENTICATION 802.1X AUTHENTICATION EAP METHODS SUPPORTED IP/MAC-BASED AUTHENTICATION MULTIPLE ACTIVE AUTHENTICATION SERVERS

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification https://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

System Structure. Steven M. Bellovin December 14,

System Structure. Steven M. Bellovin December 14, System Structure Steven M. Bellovin December 14, 2015 1 Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin December 14, 2015

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Ensuring the Success of E-Business Sites. January 2000

Ensuring the Success of E-Business Sites. January 2000 Ensuring the Success of E-Business Sites January 2000 Executive Summary Critical to your success in the e-business market is a high-capacity, high-availability and secure web site. And to ensure long-term

More information

Designing AirPort Extreme n Networks

Designing AirPort Extreme n Networks Designing AirPort Extreme 802.11n Networks 1 Contents Chapter 1 3 Getting Started 5 Configuring the AirPort Extreme Base Station for Internet Access Using AirPort Utility 6 Extending the Range of Your

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

Securing Access to Network Devices

Securing Access to Network Devices Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Wireless Network Infrastructure. Inscape Data Corporation January 10, 2006

Wireless Network Infrastructure. Inscape Data Corporation January 10, 2006 Wireless Network Infrastructure Inscape Data Corporation January 10, 2006 1 Introduction Purpose Providing fixed wireless Internet connectivity to the general population from rural towns to densely populated

More information

Access Connections 5.1 for Windows Vista: User Guide

Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Note Before using this information and the product it supports, read the general information in

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Inovatian Mesh Technology. InoMesh Specifications & System Performance Sheet

Inovatian Mesh Technology. InoMesh Specifications & System Performance Sheet Inovatian Mesh Technology InoMesh Specifications & System Performance Sheet Inovatian had developed in house a unique mesh technology: The InoMesh which is a substantial improvement over OpenWRT mesh with

More information

The Benefits of Wireless Infrastructure Management in the Cloud

The Benefits of Wireless Infrastructure Management in the Cloud WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT

More information

Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network

Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network Deployment Guide Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network The Cisco Service Oriented Network Architecture (SONA) framework helps enterprise customers evolve their

More information

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. V100R002C10 Permission Control Technical White Paper Issue 01 Date 2016-04-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : GSLC Title : GIAC Security Leadership Certification (GSLC) Vendors : GIAC

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Access Point WIRELESS. WAP54G v2. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Access Point WIRELESS. WAP54G v2. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G v2 Copyright and Trademarks Specifications are subject to change without notice. Linksys is

More information

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS WHAT IS POLARCOIN? (POL) Polarcoin is an open source peer to peer decentralized cryptocurrency. There is no server for this network cause computer

More information

2. Layer-2 Ethernet-based VPN

2. Layer-2 Ethernet-based VPN 2.1. Full Ethernet Virtualization The key concept of the method of realizing VPN by SoftEther VPN is the full virtualization of Ethernet segments, layer-2 Ethernet switches and Ethernet adapters. In order

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

Designing AirPort Networks

Designing AirPort Networks Designing AirPort Networks 1 Contents Chapter 1 5 Getting Started 6 How AirPort Works 6 How Wireless Internet Access Is Provided 7 Configuring AirPort Extreme Base Station and AirPort Express for Internet

More information

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets. Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).

More information

CONFIGURATION MANUAL. English version

CONFIGURATION MANUAL. English version CONFIGURATION MANUAL English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the

More information

Purpose of this book. Chapter 1: Where to Begin

Purpose of this book. Chapter 1: Where to Begin 1 Where to Begin This book was created by a team of individuals who each, in their own field, are actively participating in the ever-expanding Internet by pushing its reach farther than ever before. The

More information

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity

More information

Computer to Network Connection

Computer to Network Connection Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

User Guide Outdoor Point to Point CPE

User Guide Outdoor Point to Point CPE Outdoor Outdoor Point to Point CPE Copyright Statement 2018 IP-COM Networks Co., Ltd. All rights reserved. is the registered trademark of IP-COM Networks Co., Ltd. Other brand and product names mentioned

More information

A Leading Internet Business Enabler

A Leading Internet Business Enabler A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My guests are bringing too many devices into my network. How do I manage them? I allow my

More information

Wireless LAN Device Series. ZW-2000-IA User Manual

Wireless LAN Device Series. ZW-2000-IA User Manual Wireless LAN Device Series WLAN Outdoor Bridge ZW-2000-IA User Manual Version. TABLE OF CONTENTS PREFACE...3 CH 1. ZW-2000 INSTALLATION...4 PACKING LIST...4 HARDWARE INSTALLATION...5 CH 2. FIRST TIME CONFIGURATION...8

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

WHITE PAPER. A Manager s Guide To Wireless Hotspots How To Take Advantage Of Them While Protecting The Security Of Your Corporate Network

WHITE PAPER. A Manager s Guide To Wireless Hotspots How To Take Advantage Of Them While Protecting The Security Of Your Corporate Network WHITE PAPER A Manager s Guide To Wireless Hotspots How To Take Advantage Of Them While Protecting The Security Of Your Corporate Network This paper discusses the security risks inherent in public Wi-Fi

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

TCP / IP. Isidro Martinez Director, Latin Amèrica

TCP / IP. Isidro Martinez Director, Latin Amèrica TCP / IP Isidro Martinez Director, Latin Amèrica Summary TCP/IP introduction IP addressing LAN, PSTN Services: Ping TCP, UDP DNS FTP, HTTP, Telnet SMTP, POP3 TCP/IP protocol suite Defines a set of protocols

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Designing a System. We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10,

Designing a System. We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10, Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10, 2007 1 Some of Our Tools Encryption Authentication mechanisms Access

More information

Chapter 1 Introduction

Chapter 1 Introduction Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping

How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping Introduction The following paper provides instructions on how

More information

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials

More information